Featured Slideshow

In a Dallas courtroom on Thursday, writer and activist Barrett Brown was sentenced to 63 months in prison and was ordered to pay a little more than $890,000 in restitution and fines, according to reports.

Upcoming Live Events

Be sure to stay tuned for breaking news on our 2015 conference and expo, which promises to deliver even more innovative programming and an enhanced showcase of the latest cyber security solutions you must see.

Presidential cyber security order almost ready

As comprehensive cyber security legislation languishes in Congress, President Obama may be close to acting on an executive order.

Set to deliver his State of the Union address on Tuesday, the president is expected to follow up soon after with an executive order on cyber security that is several months in the making. It is expected to establish a program that will ask critical infrastructure operators to meet certain voluntary standards around network protection. The order first was contemplated after security legislation failed last year in the Senate.

According to a Friday Bloomberg story, which cited two former White House officials brief on the plans, the order will recommend that federal agencies apply the standards to existing regulations. In addition, the order will request that the government share additional threat information with the private sector.

A common complaint among security professionals in the private sector is that information sharing often amounts to a one-way street, with corporations often providing intelligence to three-letter agencies, but never receiving much data in return.

It's unclear whether Obama will detail any cyber security plans during Tuesday's address. But the topic certainly is a timely one for him. Two Sundays ago, The New York Times reported that, following a legal review, Obama now has the power to pre-emptively order cyber strikes based on evidence that the country is facing an impending digital attack.

SC Magazine arms information security professionals with the in-depth, unbiased business and technical information they need to tackle the countless security challenges they face and establish risk management and compliance postures that underpin overall business strategies.